Distributed Chasing of Network Intruders by Mobile Agents
نویسندگان
چکیده
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Distributed Chasing of Network Intruders by Mobile Agents. Lélia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial
منابع مشابه
DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs
Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...
متن کاملDynamic Obstacle Avoidance by Distributed Algorithm based on Reinforcement Learning (RESEARCH NOTE)
In this paper we focus on the application of reinforcement learning to obstacle avoidance in dynamic Environments in wireless sensor networks. A distributed algorithm based on reinforcement learning is developed for sensor networks to guide mobile robot through the dynamic obstacles. The sensor network models the danger of the area under coverage as obstacles, and has the property of adoption o...
متن کاملA Cluster-Based Distributed Hierarchical IDS for MANETs
Many attempts were made to secure wireless ad hoc networks, but due to special ad-hoc nature, which is lack of a fixed infrastructure and central management, finding an optimal and comprehensive security solution is still a research challenge. Intrusion detection system is one of key techniques and best solution instead of intrusion protection behind protecting a network against intruders on mo...
متن کاملParadigms for Reliable Communication Protocols in Mobile Agents based Systems
Mobile Agents are regarded as a promising paradigm for future distributed computing. Among essential features of mobile agents, communication is a fundamental ability that enables mobile agents to cooperate with each other. But the presence of mobility raises a number of new challenges in designing message delivery protocols for effective and efficient communications between mobile agents, espe...
متن کاملIntrusion Detection System Designed for Wireless using JADE Mobile Agent Framework
In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. To address the securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2018